What is a buffer overflow, and how is it used against a Web server?
Consider that an individual threat agent, like a hacker, can be a factor in more than
one threat category. If a hacker breaks into a network, copies a few files, defaces a
Web page, and steals credit card numbers, how many different threat categories does
the attack fall into?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here